Results 21 to 30 of about 373,465 (244)

Stochastic-Geometry-Based Performance Analysis of Delayed Mobile Data Offloading With Mobility Prediction in Dense IEEE 802.11 Networks

open access: yesIEEE Access, 2017
Mobile data offloading through Wi-Fi is a promising solution to alleviate the explosive data increase in cellular network. While extensive attempts have been made at mobile data offloading, previous studies have rarely paid attention to network ...
Zhiqun Hu   +3 more
doaj   +1 more source

On-Demand Cooperation Among Multiple Infrastructure Networks for Multi-Tenant Slicing: a Complex Network Perspective

open access: yesIEEE Access, 2018
Network slicing is a promising technology for wireless networks to provide various services using limited resources of infrastructure networks. In order to decrease capital expenditure and operational expenditure, multi-tenant slicing provides resource ...
Wanqing Guan   +3 more
doaj   +1 more source

Scaling Analysis of Multilevel Polar Coded Modulation

open access: yesIEEE Access, 2019
In this paper, we analyze and prove the capacity-achieving property of the equivalent asymmetric channels of multilevel polar-coded modulation in view of the scaling assuming regime, which employ some techniques of symmetric channels.
Kun Zhao   +3 more
doaj   +1 more source

Application of Category Theory to Network Service Fault Detection

open access: yesIEEE Open Journal of the Communications Society
Network automation has become crucial in supporting services in 6G networks. This mainly derives from the complexity of the composition of numerous distributed virtual network functions (VNFs) in creating highly flexible virtual network services ...
Pedro Martinez-Julia   +2 more
doaj   +1 more source

Development of Cloud Platform for Controlling Internet of Things Devices

open access: yesСовременные информационные технологии и IT-образование, 2022
Currently, solutions based on the Internet of Things are becoming widely in demand. The concept of the Internet of Things implies the construction of a software-defined network (SDN) of physical devices with integrated mechanisms of interaction both ...
Dmitry Perepelkin, Daniil Tkachev
doaj   +1 more source

Phosphatidylinositol 4‐kinase as a target of pathogens—friend or foe?

open access: yesFEBS Letters, EarlyView.
This graphical summary illustrates the roles of phosphatidylinositol 4‐kinases (PI4Ks). PI4Ks regulate key cellular processes and can be hijacked by pathogens, such as viruses, bacteria and parasites, to support their intracellular replication. Their dual role as essential host enzymes and pathogen cofactors makes them promising drug targets.
Ana C. Mendes   +3 more
wiley   +1 more source

Interplay between circadian and other transcription factors—Implications for cycling transcriptome reprogramming

open access: yesFEBS Letters, EarlyView.
This perspective highlights emerging insights into how the circadian transcription factor CLOCK:BMAL1 regulates chromatin architecture, cooperates with other transcription factors, and coordinates enhancer dynamics. We propose an updated framework for how circadian transcription factors operate within dynamic and multifactorial chromatin landscapes ...
Xinyu Y. Nie, Jerome S. Menet
wiley   +1 more source

Disordered but rhythmic—the role of intrinsic protein disorder in eukaryotic circadian timing

open access: yesFEBS Letters, EarlyView.
Unstructured domains known as intrinsically disordered regions (IDRs) are present in nearly every part of the eukaryotic core circadian oscillator. IDRs enable many diverse inter‐ and intramolecular interactions that support clock function. IDR conformations are highly tunable by post‐translational modifications and environmental conditions, which ...
Emery T. Usher, Jacqueline F. Pelham
wiley   +1 more source

Time after time – circadian clocks through the lens of oscillator theory

open access: yesFEBS Letters, EarlyView.
Oscillator theory bridges physics and circadian biology. Damped oscillators require external drivers, while limit cycles emerge from delayed feedback and nonlinearities. Coupling enables tissue‐level coherence, and entrainment aligns internal clocks with environmental cues.
Marta del Olmo   +2 more
wiley   +1 more source

HA: An Influential Node Identification Algorithm Based on Hub-Triggered Neighborhood Decomposition and Asymmetric Order-by-Order Recurrence Model

open access: yesEntropy
In recent years, the rise of power network security incidents caused by malicious attacks has drawn considerable attention to identifying influential nodes in power networks.
Min Zhao   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy